What are two controls that the Cisco WSA can use to validate web requests? (Choose two.)
A. basic URL filtering that leverages pre-defined, category-based web usage controls
B. AMP for isolating reputable exploits and malware samples to its local disk for further investigation
C. a reputation database that is used to analyze web requests as part of a security control procedure
D. IPS-based signatures that are loaded in the Cisco WSA to prevent intrusions and alert system administrators
E. a reputation database within the Cisco WSA that uses Snort-like rule sets to combat RootKit intrusions